Skip to main content

Browse All Stories

3 results found
Classroom Information Systems 2020 2005–2009
Imagine hacking into a Furby, picking a lockbox, shooting targets with Nerf guns, diving into piles of (clean) trash, and sliding under string “laser beams,” all with the end goal of identifying—and then fixing—vulnerabilities in a wireless computer security system.
Filled with fine granular rock and mineral particles, sandboxes are a child’s paradise. They foster creativity in a realm of seemingly endless possibilities. The pull is so strong they often attract even the family cat.
An average person attending a lecture about “model-driven system development” would likely be lost and confused within minutes. Likewise, as Stephen Liddle has attempted to teach this concept in his ISys 532 class, he is often met with blank stares.